When getting started with DMARC, a common point of confusion is what specific header it uses for its alignment checks. The simple answer is that DMARC doesn't introduce a new, unique header for its checks. Instead, it leverages the most important header from a user's perspective: the From: header. This is the email address your recipients see in their inbox.
DMARC's primary job is to ensure that the domain in the From: header is the actual sender of the email. It achieves this by checking that the domains used for SPF and DKIM authentication are "aligned" with the From: header's domain.
The From: header is the linchpin of the entire DMARC process. It represents the sender's identity as far as the end-user is concerned. If a scammer spoofs this address, the recipient might believe the email is from a trusted source. DMARC was designed specifically to prevent this by verifying that the technical authentication mechanisms (SPF and DKIM) point back to the same domain the user sees.
For an email to pass DMARC, it must first pass either SPF or DKIM authentication. Secondly, the domain used in the passed authentication check must align with the domain in the From: header. This is known as "identifier alignment". Let's break down how it works for both SPF and DKIM.
SPF authenticates the server sending the email. It does this by checking the domain in the email's Return-Path header (also known as the `Mail From` or `Envelope From`). For DMARC SPF alignment, the receiving server compares the domain in this Return-Path with the domain in the visible From: header.
DKIM provides a cryptographic signature to verify that the message hasn't been tampered with. This signature is stored in the DKIM-Signature header and includes a domain tag (d=). For DMARC DKIM alignment, the receiving server compares the domain in this d= tag with the domain in the visible From: header.
In summary, DMARC's power comes from this process of alignment. It connects the visible From: address that humans see with the underlying technical authentication headers that mail servers check. By requiring that these domains match, DMARC ensures that an email is not just authenticated, but that it is authenticated by the same entity it claims to be from, effectively stopping direct domain spoofing.
Does DMARC authenticate the 'From' header directly?
What is the DMARC version specified by the 'v' tag?
What DNS record type is used for DMARC?
Does DMARC 'relaxed' alignment match a subdomain to the organizational domain?
Does DMARC apply to the envelope 'From' address?
What is the role of the 'dkim-alignment' in DMARC?